ChapterPDF Available

Internet of Things (IoT) and the Digital Business Environment: A Standpoint Inclusive Cyber Space, Cyber Crimes, and Cybersecurity

Authors:

Figures

Content may be subject to copyright.
CHAPTER 6
Internet of Things (IoT) and the Digital
Business Environment: A Standpoint
Inclusive Cyber Space, Cyber Crimes,
and Cybersecurity
ANAND NAYYAR,1 RUDRA RAMESHWAR,2 and ARUN SOLANKI3
1


2Thapar Institute of Engineering and Technology,
L.M. Thapar School of Management, Thapar School of Management,

E-mail: rudrarameshwar@gmail.com
3

E-mail: ymca.arun@gmail.com
ABSTRACT
Internet of Things (IoT) has a strong backbone support via enhanced devel-
opments in the area of RFID, smart sensors, communication technologies,
and internet protocols. The primary objective is to integrate smart sensors
to work collaboratively without any sort of human intervention to deliver
the best of the class applications and services. With the revolution via
Industry 4.0, Smart Phones, Machine Learning, Deep Learning, and Smart
Sensors, in the coming years, IoT is expected to bridge up all diverse tech-
nologies to enable new applications via connecting physical objectives
to make the intelligent decision making. The chapter outlines an in-depth
Apple Academic Press
Author Copy
For Non-Commercial Use
112
The Evolution of Business in the Cyber Age
overview of IoT-Technical details, enabling technologies followed by an
in-depth technical overview of protocols enabling IoT-device to device
communication. The chapter enlists cybersecurity issues surrounding IoT
to enable researchers and developers to speed up research in these areas
along with an overview of various simulation tools available for carrying
out research on IoT.
6.1 INTRODUCTION
6.1.1 INTERNET OF THINGS (IOT)
Well is quite known to everyone that in modern world advanced sensors
and related devices used in hosting other devices such as mobile phones,
monitors used at hospitals are connected in a closed envelope of cyberspace
or cyber-physical system; simply to measure and monitor time, location of
human beings and automobile movements, machine vibrations, humidity
in the atmosphere, precipitation, and temperature, etc. (Lohr, 2012).
The Internet of Things (Camarinha-Matos et al., 2013) in short, mostly
professional world called IoT, it connes new domain and endlessly
produces data streams across the globe with its geographical impression
or footprints from interconnected mobile devices, laptops, computers,
actuators, sensors, RFID tags, etc. (Michael and Miller, 2013; Van-Den-
Dam, 2013). However, in a broader spectrum, Big Data generated from
these devices categorized in IoT, which contains well-o Spatio-temporal
information-data. Presently in the age of technology development, an
advancement in the area of IoT and Big Data Analytics, Advance Technolo-
gies presents an array of modern applications including better product-line
management, supplementary eectual and appropriate unlawful exami-
nation, enhancing farming yield output (Jiang et al., 2009; Hori et al.,
2010; Xing et al., 2010; Bo and Wang, 2011), and increasing speed of the
expansion of smart cities (Belissent, 2010; Schaers et al., 2011; Gubbi et
al., 2013) with new architecture (Balakrishna, 2012; Mitton et al., 2012;
Theodoridis et al., 2013; Jin et al., 2014), world-class infrastructure and
communication network step-up.
In the age of Social Media and a high-speed internet connection,
various social networks are active such as Facebook, Twitter, LinkedIn;
Blogs generate Big Data, responsible for the transformation of the social
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 113
sciences area in and around. However, during the time of writing, many
social media users, particularly in case of Twitter, users across the globe
roughly or on an average 6000+ tweet per second, fairly which corre-
sponds to 500+ million tweets /day and around 200+ billion tweets/year,
according to internet Live Stats-2016 database. Similarly, the big data
count follows in the case of Facebook, LinkedIn, Blogs, WhatsApp, and
other social media platforms.
Nonetheless, Social Scientists, Economists, Political Scientists, and
other scholars use Big Data mining methods to analyze social variable
and their interactions regarding research parameters in vibrant areas
such as health records, phone logs, government records and other digital
traces (Boyd and Crawford, 2012). Even as such data mining methods
promote governments and social studies (Grimmer, 2015) increases big
data acquaintances, it is still demanding to rapidly haul out spatiotemporal
patterns from big data social aairs too, for example, it helps in the predic-
tion of criminal activity (Hener, 2014) on the continuous evaluation
basis, scrutinize emerging public health threats and provide more eective
intervention (Lampos and Cristianini, 2010; Jalali et al., 2012) solutions to
ongoing threats in the concerned areas.
6.1.2 DIGITAL BUSINESS ENVIRONMENT
Digital business environment is altering customer expectations and
business models. It is changing how businesses converse, conduct, and
network with customers as well as with other business such as partners
and suppliers. It is increasing the pace of business. And it is changing
industries and the competitive landscape through a social web monitoring
system based on IoT, Big Data, Information Framework, Networking
Technologies, and Leveraging Cloud Computing.”Digital business is blur-
ring the digital and physical worlds. According to Forbes, Digital Business
is Everyone’s Business. Moreover, it agreed to support in an exceptional
meeting of person, business strategies, and other belongings that inter-
rupts accessible business models – even those born of the internet and
e-business eras.” According to Jorge Lopez, a ‘distinguished analyst’ with
Gartner, Digital business is shaping the future-and businesses must evolve
their business ecosystems and technology to remain competitive.
Apple Academic Press
Author Copy
For Non-Commercial Use
114
The Evolution of Business in the Cyber Age
“If digital disruption can be viewed as a wave sweeping over indus-
tries, most are in the crest of that wave or soon will be,” according to
research from HBR, an overwhelming majority (80%) of the executives
in a Harvard Business Review (HBR) study thinks “their industry will be
disrupted” by global digital business trends, according to HBR, competing
in 2020: Winners and Losers in the Digital Economy, April 2017.
“Digital technology platforms are the building blocks for a digital busi-
ness. In case of Gartner’s Top 10 Strategic Technology Trends for 2017,
January 2017, every organization [must] have some mix of digital tech-
nology platforms: Information systems, customer experience, analytics,
and intelligence, the Internet of Things and business ecosystems,” said
the HBR study authors in Gartner. One critical point in keeping pace with
the evolving digital environment is ensuring the evolution of the manage-
ment and transfer of business-critical data. In the digital era, constantly
evolving forms of digital data must be synchronized and shared- and done
so quickly, eciently, and securely-with consumers, partners, and other
businesses.
6.2 BACKGROUND
6.2.1 CYBERSECURITY REGULATIONS IMPROVEMENT
We ought to see a proceeding enhancement within the pertinent regula-
tions as connected to cybersecurity. The fast-moving and dynamic nature
of cybersecurity outpaces regulation which is far too clumsy and slow to
be of any advantage and might really ruin security by building a culture
of compliance with regulations and a wrong sense of security against
enemies who are clever, motivated, and agile.
6.2.2 DATA THEFT TURNING INTO DATA MANIPULATION
We can anticipate seeing attackers changing their strategy from website
hacking and pure data theft to attacking data integrity itself. This sort of
attack, in comparison to a straightforward theft of data, will serve to cause
long-term, reputational harm to people or groups by getting individuals to
question the integrity of the data in question.
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 115
6.3 CYBERSECURITY AND INTERNET OF THINGS (IOT)
6.3.1 CYBERSECURITY AND INTERNET OF THINGS (IOT):
CHALLENGES AND ISSUES
The rapid development of smart IoT devices (Rose et al., 2015) has opened
up a number of ways for hackers to invade user privacy. The IoT is making
our lives easier while leaving us less secure. Whenever a major techno-
logical innovation comes along, hackers find ways to exploit it. The world
of IoT includes a huge variety of wire and wireless devices like smart-
phones, personal computers, PDAs, laptops, tablets, and other handheld
embedded devices. IoT has also been known as Cyber-Physical Systems
(CPS), M2M (Machine to Machine), and Simply Industrial Internet (SII)
and connected devices. The generic topology of the IoT seen in layers to
incorporate the Datacenter, Gateway, IoT Gadgets and Sensors. The IoT
devices used sensors and wireless communication network to communi-
cate with each other and transfer information to the centralized system.
These days the embracing rate of the IoT devices is very high, increas-
ingly gadgets are connected via the internet. In the current scenario, these
devices are targeted by attackers and intruders. A report found that 70% of
the IoT devices are very easy to attack (Hossain et al., 2015) (Figure 6.1).
FIGURE 6.1 (See color insert.) IoT topology.
Apple Academic Press
Author Copy
For Non-Commercial Use
116
The Evolution of Business in the Cyber Age
There are many critical challenges and issues regarding the security
of IoT devices. This section covers these issues and suggests the prob-
able solution. Generally, IoT has used Perception, Network, Middle, and
Application layer in data transmission and processing (Suo et al., 2012).
Each layer has its own importance.
Network layer transmits the gathered information obtained from the
perception layer. This information is sent by using existing communication
networks like the Internet, Mobile Network, or any other kind of reliable
network (Yang et al., 2012). The middle layer comprises of information
processing systems that take automated activities based on the results of
processed data received from the network layer. This layer also links the
system with the database, which is having information about the collected
data. The middle layer is a service-oriented layer which ensures the same
service type as the connected IoT devices (Khan, 2012). The application
layer is founded on TCP and UDP to solve the communication challenges
and used by various applications like Smart Home, Smart Environment,
Smart Transportation and Smart Hospital, etc. (Rong and Tao, 2013).
The major security goal of IoT is Data Condentiality, Data Integrity,
and Data Availability; whereas Data condentiality ensures that there will
be no outer inference. It ensures that only trusted communication will be
taken place, and no information will be leaked to outsiders. Two steps
verication like Gmail or the encryption process may be used to achieve
data condentiality. These techniques provide authentication to the trusted
user only. In the current trend, biometric verication is used for user
authentication (Miorandi et al., 2012).
During data transmission, data could be accessed or changed by the
intruders or cybercriminals or could be aected by various other aspects
like the crash of a server or an electromagnetic disturbance. Data Integ-
rity ensures that data should not be tampered with during transmission
by intruders, hackers, or cybercriminals (Atzori et al., 2010). Dierent
methods like Checksum and Cyclic Redundancy Check (CRC) are used
to ensure the originality of data. Availability of data to trusted resources
is a major challenge in IoT. IoT protocol ensures that every authenticate
resource will always access the data as required. It may be possible
some entrusted resource wants to access the condential information so
it is necessary to provide rewalls to countermeasure the attacks on the
services like Denial-of-Service (DoS) attack which can deny the avail-
ability of data (Reddy et al., 2017).
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 117
1. Cybersecurity Lacks Control Environment and Tools for IoT
Devices: In cyberspace, commercial products are at high risk. Currently,
there is no up to the mark security measures, and even no tool exists to
remove the existing risk. As the consumer is not aware of this risk, so
consumer demand in the cybersecurity area remains low. Especially in
consumer products as many types of attacks, such as denial-of-service
attacks, do not aect the people who own the equipment. If media or social
sites aware the consumer about risk in cyberspace, then vulnerabilities
might raise consumer awareness of the impacts of inadequate cybersecu-
rity, and with it the demands they make of manufacturers.
There is a need for “trusted IoT label” for IoT products that meet
certain security requirements. This label will be aware of the specication
of IoT product with risk, and it will clearly deliver more energy-ecient
products to the consumer. The government should take some initiative
through legislation and regulation. These rules will decrease the risk of
IoT products. The labeling of IoT Products under these rules places greater
responsibility on the manufacturers and importers of products, and this has
generally worked well (Appazov, 2014). A feasible cybersecurity structure
shall aim at the evolution of the adequate cybersecurity environment for
IoT devices. Therefore, it shall include national and international coopera-
tive eorts to develop standards, methodologies, procedures, and processes
that align policy comprising business, health, entertainment, education,
and technology approaches to address cybersecurity issues (Teplinsky,
2013). The private sector will play as signicant a role in the implementa-
tion of the policy as does the public sector. The policy on cybersecurity
shall be informed by the adequate understanding of the cyber-vulnerability
threat on the part of the policy development.
6.3.2 WHY ATTACKERS WILL CONTINUE TO TARGET CONSUMER
DEVICES?
In the era of the IoT, the smart devices are the part of every aspect of our
lives which include homes, offices, cars, and even our bodies. As internet
upgraded to IP4 to IPv6 and Wi-Fi network advances, IoT is growing at
a very fast speed, and researchers estimate that by 2020, the number of
active wireless connected devices will exceed 40 billion (ABI Research,
2014). As the number of active connected devices increases the chance
of hacking the data will be increased and targeted by the cybercriminals.
Apple Academic Press
Author Copy
For Non-Commercial Use
118
The Evolution of Business in the Cyber Age
The IoT companies are constantly making smart-devices at low cost to
customers. As a result, companies have to lower down the security of an
IoT device in favor of its cost, size, and low energy consumption. These
devices are different from each other in their application area.
Nowadays, in the market, there are lots of smart-gadgets with poor
security services available to a remote attacker. Consumers never think
that their smart device is not venerable and these devices can be hacked
in a matter of seconds. The large-scale gathering of IoT devices and
user-generated content opens user to the risk of data misuse and abuse. If
proper security measures have not taken then it becomes disasters to the
IoT users. In the basic IoT environment, shows simple information that is
easy to understand for possible vulnerable components.
By analyzing the IoT environment, there is a possibility to dene
possible attack vectors used by attackers. The environment consists of
a basic sensor which collects measurable data. The transmission of data
from the sensor to the server gives many loopholes for attackers. Attackers
used these loopholes and hacked or modify the IoT environment.
This section will cover the loopholes in IoT devices which are used by
attackers to hack the consumer devices:
Users are not using the secure web/desktop/mobile applications
which can provide proper authentication and authorization.
Two-step authentications are not used by the IoT device security.
Hackers used a Cross-Site Scripting (XSS), SQL injection, and
Buffer over Flow (BoF) vulnerabilities to hack the IoT devices.
Simple passwords like ‘123,’ ‘password,’ the name of the user, date
of birth, etc. lead to hacking of IoT device.
Not using Captcha to secure IoT devices.
Brute force attacks are done by the hackers.
Companies are not providing the security updates including details
on security fixes, the impact of the vulnerability, etc.
Consumers are not using encryption for communication.
Vendors or customers are providing sensitive data like name,
phone number, DOB, etc., publicly through different social media
platforms.
Vendors are not testing the security of IoT devices when new
features are added.
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 119
Following are some proposed solution to overcome the security issues
in IoT devices:
The user always updates their device security from a trusted source.
User updates device regularly.
Users always read the manual and user instructions provided by the
vendor.
2-way authentication always provides the enhanced security to the
device.
Use strong, unique, and complex passwords at least 8–20 characters
with a mixture of letters, numbers, and special characters.
The user always ensures to take backups in a secure place.
Stop unwanted services used by the devices.
DTH service is one of the examples of IoT device. What happens if
hackers hack the personal information of a user and use this information to
hack the DTH service? There will be a big impact on DTH business which
may lead to the following consequences:
Customer personal information can be used for social engineering
or any other advanced attacks.
DTH service may be interrupted.
The consumer will not trust DTH service providers.
Consumer account, including recharge money can be lost.
Data are theft by the hackers, including favorite channels, recording,
etc.
The IoT is forcing many business leaders to reassess their approaches
to cyber risk management.
6.3.3 PROTECTION OF IOT DEVICES IN CYBER SPACE
The first question comes in the consumer mind why we need to protect
IoT device data. The reason is to protect one’s own intellectual property
against other competitors. This is a way of preventing others to compro-
mise one’s own environment and use it for malicious purposes (Sagedhi,
2017). The IoT device security in cyberspace is presented with the triangle.
Apple Academic Press
Author Copy
For Non-Commercial Use
120
The Evolution of Business in the Cyber Age
This triangle visualizes the essential steps desired to obtain a high level of
security consciousness with IoT devices (Sagedhi, 2017).
The triangle will be visualized from bottom to top i.e., green part is the
target. The rst two gray steps, i.e., meaningfulness/usefulness and func-
tional correctness are the starting point of the journey to a higher security
level. These two levels show that an IoT device with internet without any
security features can have duplicate MACs or IP addresses. The security in
these three steps is like unique passwords; the latest software and rmware
versions secured communication protocol such as HTTPS securing web
front-end and security architecture. These three steps in brown color are the
rst implemented security procedures and therefore they aware consumer.
The next three levels with yellow present a higher level of security imple-
mented in an IoT environment. The practical implementations with these
levels are like swarm attestation, IoT sentinel and the implementation of
automatic vulnerability and attack detection (Figure 6.2).
FIGURE 6.2 (See color insert.) Cybersecurity awareness triangle.
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 121
The top green triangle is the level IoT device should strive to whenever
it is possible and reasonable as well as economically wise.
Within the current situation, there are more IoT gadgets than people
on Earth, engineers, and developers got to embrace a new paradigm for
cybersecurity within the IoT age. The rapid increase of IoT has produced
big data. Smart sensors are gathering statistics, which are used in the
machine learning algorithm and can be used to attract the customers for
any business. The sheer volume of this data generated from IoT devices
is extremely large. This large volume of data is a security threat if it is not
secure. To make it secure, organizations/users have to do the following
things:
The organization has to prepare an inventory of all IoT usage
because it’s impossible to defend the unknown.
The user has to change the default user id and password. Attackers
know these platforms and their defaults. The new password should
be strong.
Passwords should be changed regularly.
The user should disable unnecessary remote administration and
features.
Do not allow untrusted access to the device from the Internet.
Don’t empower universal plug and play on IoT devices.
Use secure protocols like HTTPS and SSH for communications.
Include IoT devices in regular vulnerability management
programs.
1. Dening Security Implementation: To secure IoT devices in
cyberspace, it is necessary to nd possible attack vectors. These attack
vectors might be against the IoT environment. Therefore, security admin-
istrator and system administrator need to secure the environment against
the vulnerability of the IoT devices (Palmers, 2013). The methods for
analyzing the environment could be similar to the zero-day vulnerability
analysis (Figure 6.3).
The zero-day attack is a phenomenon that secures computer appli-
ances before the vulnerability is known or patched against the vulnerable
(Salonen, 2017).
Apple Academic Press
Author Copy
For Non-Commercial Use
122
The Evolution of Business in the Cyber Age
FIGURE 6.3 Security implementation in IoT environment.
6.4 SOLUTIONS AND RECOMMENDATIONS
6.4.1 PROTOCOLS FOR INTERNET OF THINGS (IOT)

Internet of Things (IoT) plays a crucial role in varied application areas like
Industry 4.0, healthcare, transportation, agriculture, autonomous vehicles
and even disaster management. These days, IoT has also started impro-
vising the quality of daily life of human beings by providing portable and
smart gadgets, business operations in terms of logistics and manufacturing
and future smart homes (Suryadevara and Mukhopadhyay, 2018). The
most prominent example is Smart Home, where everything is controlled
via Sensors like Temperature, Air Conditioning, Kitchen Home Appli-
ances, Lighting, Security cameras, and even cleaning via Smart Robotics.
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 123
Seeing the current research interests of various researchers in IoT,
many new protocols are evolving and getting standardized. Internet of
Things (IoT) is expanding to a plethora of applications via hardware
minimization, smart sensors and “Smart Objects,” and many protocols
are evolving to facilitate Machine to Machine communications. Because
of the remote nature and requirement of wireless networking of smart
objects, IoT systems have to cope up with various limitations in terms of
unreliable, intermittent, and low bandwidth connections for network access
(Javed et al., 2018). To facilitate communication between devices, lots of
protocols are proposed for dierent layers of IoT: Data Link, Network
Layer (Routing and Encapsulation), Session Layer, IoT Management and
Security.

Till date, there is no as such properly defined and proposed architecture
for IoT, which is agreed universally. Internet of Things (IoT) architecture
can be three-layer or five-layer (Mashal et al., 2015; Said and Masud,
2013; Wu et al., 2010). The three-layer architecture was proposed in the
early days of IoT research. It contains three main layers: Perception layer,
Network Layer and Application layer. The bottommost layer of IoT archi-
tecture is perception layer, which is primarily responsible for acquiring
information from devices and convert into digital form. The network layer
is primarily responsible for transmitting digital signals over the network
and application layer is responsible for transferring digital signals to varied
applications (Figure 6.4).
Perception Layer: In the initial stage of Internet of Things (IoT),
the major task of perception layer is to collect all the data from devices or
objects sensed from the environment, i.e., Temperature, Humidity, Gases,
etc. All the sensors operational in sensor network, performs the task of
collecting, computing, processing, and transmitting varied types of data
to the perception layer. The sensors and other objects in IoT, i.e., GPS
Devices, IP Cameras, Actuators all communication among one another via
specialized network technologies like ZigBee, Wi-Fi, and other short-range
communication protocols. IoT connects lots of heterogeneous devices, so
it is highly required to identify and connect every object or thing in a
signicant manner. Latest research technologies like 6LoWPAN are also
used to connect the devices within the network without any hiccup.
Apple Academic Press
Author Copy
For Non-Commercial Use
124
The Evolution of Business in the Cyber Age
FIGURE 6.4 Three-layers and five-tier architecture for Internet of Things.
(Source: IoT Direct, (2017). All About Internet of Things. Retrieved from: http://iotdirect.
blogspot.com/.)
Network Layer: It is regarded as backbone for IoT architecture
and transmits all the data from perception layer to the application
layer in a highly secured manner. The network layer is regarded as the
delivery layer to collect all information acquired from perception layer
and deliver to application layer, i.e., Servers, and Application Softwares.
Lots of research is being conducted till date to propose routing protocols,
and sophisticated communication technologies in the network layer to
improvise core network operations. Unique addressing ecient routing
ensures seamless integration of devices comprising an IoT network.
All types of Wired, Wireless Technologies-Wi-Fi, Bluetooth, RFID,
6LoWPAN ensure unique addressing and break-free connectivity in IoT
network.
Application Layer: The topmost layer of IoT architecture is the
application layer providing a bridge between applications and users.
It provides application-specic services to the end-user. It facilitates
Intelligent IoT based real-time solutions like Remote Health Moni-
toring, Autonomous Transportation, Disaster Monitoring, Industrial
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 125
Manufacturing and many more. This layer handles all the global manage-
ment of IoT applications (Mashal et al., 2015).
The IoT architecture comprising three layers (Perception, Network,
and Application) no doubt have created a strong foundation of IoT, but
it is not sucient enough to accommodate the advanced concepts of
Internet of Things. In order to facilitate, more advanced research, IoT
architecture is facilitated with new architecture comprising ve layers-
Perception, Transport, Processing, Application, and Business layer
(Mashal et al., 2015; Said and Masud, 2013; Wu et al., 2010; Khan et
al., 2012) -
Transport Layer: It performs the task of sensor data transfer
from perception layer to processing layer and vice versa using network
communication standards like Wi-Fi, LAN, Bluetooth, RFID, NFC, and
6LoWPAN.
Processing Layer: It is also termed as middleware layer. It
performs the tasks of storing, analyzing, and processing tons of data
acquired from the transport layer. Various ICT technologies, i.e., Big
Data, Cloud Computing, Data Processing Modules all forms processing
layer.
Business Layer: The entire management of whole IoT ecosystem
is performed by business layer which includes all types of IoT Applica-
tions, models as well as ensuring privacy and security of end-users.

The most basic protocol considered for facilitating all sorts of IoT based
communication operations was TCP/IP, as it is also regarded as a baseline
protocol for doing all sorts of computer network related operations. But
the utilization of IPv6 was restricted in IoT, as all the IoT enabled devices
are low powered and require limited bandwidth. Many Interest groups
have laid their efforts to define some IoT based standards to facilitate the
IoT development like World Wide Web Consortium (W3C), Institute of
Electrical and Electronics Engineers (IEEE), Internet Engineering Task
Force (IETF) and EPC Global.
The following sections highlight various Network Communication
protocols for IoT for various layers-Data Link, Network Layer (Routing +
Encapsulation) and Session Layer Protocols (Salman and Jain, 2015; Silva
et al., 2018) (Figure 6.5).
Apple Academic Press
Author Copy
For Non-Commercial Use
126
The Evolution of Business in the Cyber Age
FIGURE 6.5 (See color insert.) IoT communication protocols.

The IoT data link layer protocols combine Physical and MAC Layer
protocols. The following are the Data Link Layer protocols for Internet of
Things (IoT):
IEEE 802.15.4: This protocol was designed by the IEEE 802.15
PAN working group (Kivinen and Kinney, 2017). The protocol was
designed for low-power, short-range, low-bandwidth as well as low-cost
IoT based devices (LAN/MAN Standards Committee, 2003). It species
physical layer and MAC for LR-WPANs. It denes 16 channels ranging
between 2.4 GHz-2.48 GHz, where every change is 2 MHz wide and sepa-
rated by 5 MHz from each other. There are two types of devices supported
by IEEE 802.15.4:
o Fully Functional Device (FFD): For creating, coordinating, and
maintaining the network and communicating with all types of devices in
the network;
o Restricted Functional Device (RFD): Devices have limited
access and can only communicate with the coordinator.
IEEE 802.15.4 was further extended to IEEE 802.15.4e to facilitate
low power communication. The protocol denes the way how a schedule
is executed via the MAC layer, which can either be centralized or
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 127
decentralized. The protocol can facilitate star or peer to peer topologies
(LAN/MAN Standards Committee, 2003). IEEE 802.15.4 facilitates
packet size of 127 bytes and communication speed is restricted to 250
Kbps. There is inbuilt redundancy in IEEE 802.15.4 making the commu-
nication robust, detect losses and retransmission of all packet loss. The
protocol fully supports 16-bit link addresses to decrease the header size,
overloading of communication and memory requirements.
IEEE 802.11 AH: To facilitate ecient Machine to Machine
communications, a new standard protocol was proposed, i.e., IEEE
802.11ah by IEEE 80211ah task force (Adame et al., 2014). The standard
was facilitated to solve M2M networks requirements like limited power
devices, long transmission range, small data messages, low data rates and
non-critical delay. IEEE 802.11ah operates over unlicensed radio bands
depending on country-wise regulations, i.e., 863–868 MHz in Europe,
902–928 MHz in the US, and 916.5–927.5 MHz in Japan. It makes use
of OFDM-based waveform comprising 32 or 64 carriers and supports
BPSK, QPSK, and 256-QAM modulations. IEEE 802.11ah supports
three types of stations: Trac Indication Map (TIM); non-TIM stations
and unscheduled stations. TIM stations only listen to access points
beacons to transmit or receive data. Non-TIM stations don’t listen to any
sort of beacon for data transmission. They directly negotiate with Access
Points to acquire transmission time allocated in a Periodic Restricted
Access Window (PRAW).
WirelessHART: It is IoT data link protocol based on Open
Systems Interconnection model (OSI) and adopts IEEE 802.15.4–2006
standard as physical layer, and uses Time Division Multiple Access
(TDMA) in MAC for channel access and reducing collisions (Hassan et
al., 2017). WirelessHART, globally operates on standard 2.4 GHZ ISM
bank using 15 dierent channels, i.e., 11–26. It encrypts messages and
ascertains integrity to make reliable data transmission. Supports mesh,
star, or cluster topology to facilitate reliable communication as compared
to Wi-Fi especially in industrial environments. It employs redundant
routing at network layer. WirelessHART includes features like: Self-
organization, robust, Simple Implementation, and Interoperability with
other HART devices, highly energy-ecient, scalable, and self – healing
(Figure 6.6).
Apple Academic Press
Author Copy
For Non-Commercial Use
128
The Evolution of Business in the Cyber Age
FIGURE 6.6 (See color insert.) WirelessHART working.
(Source: ABB, (2018). WirelessHART Information and FAQs. Retrieved from: https://
new.abb.com/products/measurement-products/wireless-products-and-solutions/highlights/
wirelesshart-information-and-faqs.)
Z-Wave: This was designed and developed by Zensys in Denmark,
is a low-power MAC protocol based on ZigBee for home automation
and was used for IoT based communication especially for smart homes
(Alliance, 2013, 2015; Said and Masud, 2013; Wu et al., 2010). Z-Wave
operates at 908.42 MHz in the US and supports MESH topology. It can
support up to 232 nodes and supports interoperable operations. It makes
use of GFSK and Manchester channel encoding. In a Z-Wave network, the
three main devices are required to comprise a network-Central Station,
Network Controller and End-user devices. Every Z-Wave network
has unique Network ID and every device has Node ID. The Network
ID remains common for all nodes to associate with 1 Z-Wave logical
network. It’s 4 Bytes in size and nodes with dierent Network ID’s can’t
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 129
communicate among each other. Node ID is unique for end-user device
and is only 1-byte of size. Z-Wave supports mesh topology with primary
and secondary controllers (Figure 6.7).
FIGURE 6.7 (See color insert.) Z-wave network.
(Source: SmarterHOME, (2016). Hierarchy of the Z-Wave System. Retrieved from: https://
smarterhome.sk/en/blog/hierarchy-of-the-z-wave-system_39.html.)
Bluetooth Low Energy (BLE): It also termed as “Bluetooth Smart”
is part of Bluetooth 4.0 specication (Panwar and Misra, 2017; Tosi et al.,
2017). It is a short-range communication protocol and is widely adapted
in-vehicle networking as well as Machine to Machine communication.
BLE is regarded as a best alternative wireless solution as compared to
existing standards like IEEE 802.11b, ZigBee, ANT+ and Bluetooth 3.0.
It operates in standard 2.4 GHz ISM band ranging from 2.4–2.5 GHz and
is divided into 40 channels having frequencies 2402 + k x2 MHz, where
k = 0, 1, 2, 3…39. It makes use of CSMA/CA for all sorts of collision
detection and ACK for reliable message transmission. Its basic network
comprises of Master and Slave called “Piconet.”
Apple Academic Press
Author Copy
For Non-Commercial Use
130
The Evolution of Business in the Cyber Age
HomePlug: HomePlug AV is IoT based data link protocol designed
by HomePlug Powerline Alliance especially for home automation prod-
ucts (Homeplug Alliance Kit, 2018). It operates at speed of 200 Mbps
and frequency range of 2 to 28 MHz. HomePlug Power line Alliance has
designed three main specications: HomePlug AV, HomePlug Green PHY,
and HomePlug AV2.
o HomePlug 1.0: It was the rst HomePlug specication with a
speed of 14 Mbps. It makes use of CSMA/CA to transport data from 46 to
1500 bytes long from encapsulated IEEE 802.3 frames as MAC Service
Data Units.
o HomePlug AV: It was designed for applications like HDTV and
VoIP. It operates at speed of 200 Mbps in Physical Layer and 80 Mbps in
MAC Later. It uses OFDM carriers spaced at 24.414 kHz, with carriers
from 2 to 20 MHz.
o HomePlug AV2: It is based on IEEE 1901 standard and fully
interoperable with HomePlug AV and HomePlug Green PHY devices. It
supports PHY rates of 1300 Mbps with full MIMO. It was designed for
emerging applications for consumers like HDTV, Online Gaming, Home
Storage Systems, and VoIP. It oers 1 Gbps speed at Physical Layer and
600 Mbps at MAC Layer.
o HomePlug Green PHY: It was basically proposed for home appli-
ance connectivity like HVAC (Heating, Ventilation, and Air Conditioning)
as well as Smart Meters to facilitate smart grid applications with data
transmission speed of 10 Mbps. HomePlug Green PHY is designed for
low power, cheap cost and small devices facilitate reliable connectivity
during data transmission.
ITU-T G.9959: G.9959 is MAC layer protocol proposed by
International Telecommunication Unit (ITU) especially for low-cost,
bandwidth, and reliable wireless communication of IoT based devices
(Gomez et al., 2017). G.9959 based networks operate mostly in unli-
censed frequency bands depending on the countries, i.e., US-908.4
MHz, 860.4 MHz in Europe at data rates ranging from 9.6 Kbps to 100
Kbps. G.9959 networks has two dissimilar nodes: Control Nodes and
End Device nodes. All the commands are initiated by control nodes and
these commands are executed by end-device nodes. G.9959 networks,
supports mesh topology and protocol supports max 4 hops between end
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 131
nodes and max 232 nodes in a single network. The average communica-
tion distance between two nodes can be 100 feet with throughput of 40
Kbps.
DASH7: DASH7 Alliance Protocol is wireless protocol originated
from ISO 18000–7, an active RFID standard and operates on dierent
ISM bands, i.e., 433, 868 and 915 MHz (Ayoub et al., 2018; Weyn et
al., 2013, 2015). It was designed especially for IoT device to device
communication. It species all layers of the OSI model, making it very
easy to implement. DASH7 protocol is highly scalable, supports long-
range wireless communication in encrypted format and supports higher
data rate. It is based on Master/Slave architecture and is highly suitable
for lightweight and transitive trac. DASH7 protocol has 4 classes of
devices-Blinker Device-Simplex device, can perform only data trans-
mission but cannot act as receiver; Endpoint-A low power device that
can perform both roles of data transmission and receiving. As the device
supports wake-up events which gives the device the capability to receive
a request and response can be transmitted; Gateway-connects DASH7
network to outside network; Sub controller-makes use of wake on scan
cycles like typical endpoint devices. DASH7 has two foreground network
protocols: D7A Network Protocol (D7ANP) and D7A DataStream
Protocol (D7ADP).
DECT/ULE Protocol: DECT (Digital Enhanced Cordless Tele-
communications/Ultra Low Energy) is a wireless communication universal
European standard designed for Sensor Communications and Smart home
automation (Das and Havinga, 2012; Gomez and Paradells, 2010). The
main features of DECT/ULE are being ultra-low-power and consume
less energy as compared to 802.11 standards and have wider coverage
range as compared to IEEE 802.15 and BLE. DECT/ULE follows star
topology, i.e., all devices are connected to each other, and any device can
communicate with any device. DECT/ULE support FDMA, TDMA, and
time division multiplexing and faceless issues with regard to interferences
and collisions.

The main task of Network layer protocols is to route the packets from
one IoT device to another, i.e., from source IoT device to destination IoT
Apple Academic Press
Author Copy
For Non-Commercial Use
132
The Evolution of Business in the Cyber Age
device. Network layer protocols are further categorized into two catego-
ries: Routing Protocols and Encapsulation Protocols. The following are
the Network Layer Routing Protocols:
RPL (Routing Protocol for Low-Power and Lossy Networks):
IETF Routing Over Low-power and Lossy links (ROLL) working group
proposed a new distance vector protocol for IoT networks based on IPv6
for resource-constrained nodes called RPL (Winter, 2012; Vasseur, 2011).
It was primarily designed to perform minimum routing via constructing a
robust topology over lossy links. All sorts of network models like Point to
Point, Point to Multipoint and Multipoint to point are supported by RPL
protocol. RPL protocol constructs Destination Oriented Directed Acyclic
Graph (DODAG) which demonstrates all the nodes routing directions. In
DODAG, every node has complete information regarding its parent node,
but no information regarding child nodes. When a node wants to transmit
a message, it sends Destination Advertisement Object (DAO) to its parent
nodes, it is transmitted to the Root node and the root nodes transmit is
based on the destination node. If a new node wants to join the existing
network, it transmits a DODAG Information Solicitation (DIS) message
and the acknowledgment is sent by the root node via acknowledgment
message called DAO-ACk. In the entire network, the only root node has
complete information of DODAG, so all communications can only take
place via the root node.
CORPL or Cognitive RPL Protocol: This was proposed for
Cognitive Radio Enabled AMI Networks (Aijaz et al., 2015). The protocol
upgrades the conventional RPL protocol to solve dierent routing issues
in Cognitive radio environments by securing primary users as well as
fullling utility prerequisites of the auxiliary network. In order to solve
routing issues, CORPL protocol makes use of opportunistic forwarding
approach to route the packets by making use of multiple forwarder nodes
and implementing a coordinating scheme to choose the best possible next
hop to forward the packet. The approach enhances overall throughput,
reduces end-to-end delay and brings overall reliability in the network. The
two techniques are utilized by CORPL for enhancing performance in the
network because of spectrum sensing. In the rst technique, the perfor-
mance is improvised via collecting sensing schedule information of all
the neighboring nodes. The second technique improvises the performance
by reducing the sensing time of spectrum. The performance evaluation
of CORPL protocol was done in MATLAB with square region of side
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 133
1000 meters which is occupied by 9 PU transmitters and results state that
CORPL protocol has enhanced network reliability by reducing interfer-
ences by up to 50% and also reduced the deadline violation probability of
delay-sensitive trac.
CARP Protocol: CARP (Channel Aware Routing Protocol) is
a multi-hop routing protocol designed for Underwater WSN networks
(Basagni et al., 2015). Highly ecient for IoT as only small data size
packets are transmitted. The protocol takes into consideration the Link
Quality, which was calculated on the basis of previous network transmis-
sions from neighboring nodes to determine the forwarding nodes. CARP
Protocol operates as:
o Network Initialization: In this, a source node transmits a HELLO
packet in the network which contains the UNIQUE ID of the node as well
as Hop Count. When the packet is received, every node checks hop count
variable, whether greater than the hop count carried by packet by 1+ value.
If it is greater, the value is updated and the packet is transmitted otherwise
dropped.
o Data Forwarding: When a source node has many packets,
it broadcasts PING packet to search for suitable delay in neighboring
nodes. If the packet pairs>1 then packets are transmitted otherwise
dropped. Simulation-based results demonstrate that CARP protocol is
best in PDR, Delay, and minimizes energy as compared to FBR and
EFlood protocols.

6LoWPAN: Low power Wireless Personal Area Network (6LoWPAN)
is regarded as one of the most important network layer encapsulation
protocol on which different types of IoT communications can be done
(Gomes et al., 2018). It encapsulates IPv6 long headers in IEEE 802.15.4
small data size packets of max size of 127 bytes. 6LoWPAN protocol
was designed in 2007 by IETF 6LoWPAN working group. It is primarily
responsible for performing re-ordering and fragmenting of IPv6 packets,
compressing protocol stack headers, enabling stateless addressing and
creating mesh routing to maintain efficient consistency with packet trans-
mission to upper layers. Considering IoT, 6LoWPAN is highly efficient
in terms of supporting different length addresses, efficient bandwidth,
Apple Academic Press
Author Copy
For Non-Commercial Use
134
The Evolution of Business in the Cyber Age
topologies, i.e., Star or Mesh, low power utilization, low cost, scalability,
mobility, and wakeup mode.6LoWPAN has four types of headers: No
6LoWPAN (00); Dispatch (01); Mesh-Addressing (10); Fragmentation
(11).
6Lo: In 2013, IPv6 over networks of resource-constrained nodes
(6Lo) Working Group proposed 6Lo (Yushev et al., 2016). Even though
two dierent protocols were developed, i.e., 6LoWPAN and 6TiSCH
based on IEEE 802.15.4 and IEEE 802.15.4e, but still more data links
are required, so 6Lo was proposed.6Lo denes the specications for IPv6
over constrained networks as follows:
o Limitations in terms of memory, power, and processing
capabilities.
o Energy Optimization and ecient bandwidth utilization.
o Hard upper bounds on the state, code space, and processing cycles.
o Missing of some Layer 2 services like connectivity and Broadcast.
The 6Lo has produced many standards like IPv6-Over-BLE, IPv6-
Over – Z-Wave and many are in progress like IPv6-over-DECT Ultra
Low Energy, IPv6-over-BACNET Master-Slave/Token-Passing networks,
IPv6-over-NFC, IPv6 over IEEE 802.11 AH, IPv6 over WIA-PA (Wireless
networks for Industrial Automation-Process Automation).
6TiSCH: IETF, new working group was formulated in November
2013 to allow IPv6 to pass through a Time Slotted Channel Hopping
(TSCH) mode of IEEE 802.15.4E data links (Dujovne et al., 2014). It
proposes a new concept called “Channel Distribution Usage (CDU)”
which is regarded as a matrix of cells comprising of frequencies available
in columns and time slots available for all sorts of network scheduling
operations in rows. 6TiSCH is regarded as novel solution for MESH type
networks that makes use of deterministic slotted channels to avoid all
sorts of attenuations, collisions, optimize energy consumption and main-
tain load balancing of data. It was designed to provide ecient delivery
and reduce jitter and latency in WSN networks like WirelessHART and
ISA 100.11a. 6TiSCH makes use of “On-The-Fly (OTF) Scheduling” in
which every node keeps a close eye on the packet transmission queue.
If the queue gets lled up, OTF determines that there is not enough
outbound bandwidth and res additional timeslots with neighboring
nodes. It supports dierent scheduling approaches like-Distributed,
Centralized, and Hybrid.
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 135

Message Queuing Telemetry Transport (MQTT): MQTT was
outlined by IBM in 1999 and is ISO Standard: ISO/IEC PRF 20922
publish-subscribe based messaging protocol (Light, 2017). It was designed
to connect all sorts of embedded devices and networks with middleware
and applications by using TCP protocol for transport layer. MQTT is highly
simple to implement and very suitable for those devices having limited
bandwidth and operate under unreliable network. MQTT protocol is advan-
tageous in terms of throughput, but lacks latency. MQTT protocol is highly
successful for implementation, where system has three main components:
Publishers, Subscribers, and Brokers. Considering IoT, publishers are
defined as “Sensors” connected to all brokers to transmit the data and go to
sleep mode, when not in action. Subscribers are termed as “Applications”
or “Sensor Data” to connect to brokers to inform when at any point of time
new data is available. The brokers perform the task of data classification and
send to subscribers according to their requirements (Figure 6.8).
FIGURE 6.8 MQTT architecture.
(Source: Jabby, (2014). MQTT and CoAP, IoT Protocols. Retrieved from: https://www.
eclipse.org/community/eclipse_newsletter/2014/february/article2.php.)
MQTT has three QoS levels:
o Fire and Forget: Transmit the message and forget about it, i.e.,
No receipt of acknowledgment of any message transmitted from
source to the destination device.
Apple Academic Press
Author Copy
For Non-Commercial Use
136
The Evolution of Business in the Cyber Age
o Delivered at Least Once: Message is delivered at least once for
every delivery and acknowledgement is sent to the source device.
o Delivery Exactly Once: In order to assure that the message is
delivered to the destination node, 4-way handshake procedure is
applied (Figure 6.9).
FIGURE 6.9 MQTT message format.
(Source: Living Mobile, (2015). MQTT Message Format. Retrieved from: http://
ritzinmobileworld.blogspot.com/2015/05/mqtt-message-format-part-i.html)
It consists of xed message header variable header and payload. Header
comprise of 4 bytes, length is 1–4 bytes.
Secure MQTT (SMQTT): SMQTT (Secure MQTT) is regarded
as an extension of MQTT protocol, which combing standardized MQTT
with lightweight Attribute-Based Encryption (ABE) over elliptic curves
(Singh et al., 2015). The main reason behind adapting ABE algorithm is
because of its unique design which broadcasts encryption and with one
encryption a single message can be transferred to multiple users. SMQTT
protocol inherits security features via addition of new MQTT publish
message ‘Spublish’ with reserved message type ‘0000.’SMQTT has three
main entities:
o Publisher Device: Performs the task of publishing the data under
given topic.
o Subscriber Device: Receives data under same topic via broker.
o PKG or Broker: Third-party highly trusted.
SMQTT works in four main stages:
o Setup Phase: In this, all devices (Publisher and Subscriber)
register with PKG by giving a UNIQUE ID along with associ-
ated attributes. The master Secret Keyset is generated by PKG as
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 137
per CP/KP-ABE scheme and all parameters are published with a
universal set.
o Encrypt Phase: As soon as data is published, it gets encrypted,
published by broker which sends the data to the subscribers and
data gets decrypted at the subscriber end using same master secret
key. Broker transmits SUBACK to all receiving devices.
o Publish Phase: All the encrypted data is embedded as Payload
by publisher in SPublish command and the SPublish packet is
transmitted back to Broker. It’s the duty of the broker to respond
to PUBACK Packet. Publisher on receiving PUBACK acknowl-
edges with reply by transmitting PUBREL packet. Broker then
broadcasts the message to all subscribers and deletes the data and
transmits PUBCOMP packet to sender.
o Decrypt Phase: The message is decrypted using private attribute
keys by verifying whether the access policy is satised or not.
XMPP (Extensible Messaging and Presence Protocol):
Extensible Messaging and Presence Protocol (XMPP) is an XML based
communication protocol for message-oriented middleware (Ozturk, 2010;
Saint-Andre, 2011). The protocol was outlined by Jabber Open source
community in 1999 for maintaining contact list, presence information,
and real-time instant messaging and was named “Jabber.” It was later
standardized by IETF in 2002 by creating XMPP working group. XMPP
utilizes XML text format for facilitating person-to-person communication
and unlike MQTT, it runs over TCP. Considering IoT, XMPP facilitates
device addressing in a highly simple way. XMPP supports both architec-
tures: Publish/Subscribe and Request/Response, facilitating developers
with enough exibility and scalability to choose the required architecture.
XMPP gives a system for messaging over a network, which encourages
tons of applications as compared to conventional messaging and data
dispersion (Figure 6.10). The following are the key XMPP technologies:
o Core: Information with regard to core XMPP technologies for
XML streaming.
o Jingle: SIP compatible multimedia signaling for le transfer,
video, voice, and other applications.
o Multi-User Chat: Flexible, multi-party communications.
o PubSub: All sorts of alerts and real-time notications with regard
to data synchronization, etc.
o BOSH: An HTTP binding for XMPP trac.
Apple Academic Press
Author Copy
For Non-Commercial Use
138
The Evolution of Business in the Cyber Age
FIGURE 6.10 XMPP protocol – working.
(Source: rfwireless World, (2018). XMPP. Retrieved from: http://www.rfwireless-world.
com/IoT/XMPP-protocol.html.)
CoAP (Constrained Application Protocol): CoAP was proposed
by the IETF and is regarded as a service layer protocol designed for utili-
zation in resource-constrained internet devices like WSN sensor nodes
(Shelby et al., 2014; Jan et al., 2016; Bormann et al., 2012, 2018; CoAP,
2016). CoAP supports easy translation to HTTP for simple integration with
web and also provides specialized requirements in terms of less overhead,
multicasting support, simplicity towards implementation. The protocol
provides lightweight RESTful (HTTP) interface which acts as a standard
interface between HTTP client and servers. The protocol is planned to
encourage Machine-to-Machine (M2M) applications like smart energy
and smart building, automation, etc. CoAP utilizes two types of messages:
Requests and Responses via simple, binary, and base header format. In
terms of security, CoAP utilizes UDP protocol as default and also supports
DTLS for high-level communication security for message exchange.
CoAP is sub-divided into two layers: Message Sub-layer and Request/
Response sub-layer. The message layer performs the task of reliable end
to end transfer of messages between nodes and the other layer deals with
all sorts of REST communications. It incorporates a CoAP Version (V),
Transaction Type (T), OC (Option Count), Code, and Message ID (M ID)
in the header, and rest it contains Token, Options, and Payload (Figure
6.11).
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 139
FIGURE 6.11 CoAP protocol message format.
(Source: Shelby, Z., Hartke, K., Bormann, C. (2014). The Constrained Application Protocol
(CoAP). Internet Engineering Task Force (IETF). : https://tools.ietf.org/html/rfc7252)
CoAP protocol has four messaging modes:
o ConrmableMessage(CON): It requires a response, i.e., Posi-
tive or Negative Acknowledgement. In case of non-receipt of any
acknowledgment, retransmissions are done till all attempts are
done. Retransmissions make use of non-linear and exponential
strategy between attempts.
o Non-Conrmable Message (NON): It doesn’t require any sort
of Acknowledgement, but the message requires Message ID for
supervising in case of retransmission. If the message fails to be
processed at the recipient side, server responds with RST.
o Piggy-Backed: It is used for Client/Server communication,
when the server responds directly to the client after receiving the
message, i.e., Acknowledgement message for successful receipt
of the message. ACK message also contain response message, for
failure response, ACK contains failure response code.
o Separate Response: It is only used when the response from the
server comes in a message entirely dierent from acknowledg-
ment and server takes some time to transmit the message.
CoAP protocol makes use of dierent messages: GET, PUT, PUSH,
DELETE to perform operations like create, update, select, and delete.
AMQP (Advanced Message Queuing Protocol): AMQP is
another open standard protocol for IoT typically designed for message-
oriented environments (Vinoski, 2006; Naik, 2017; Luzuriaga et al.,
2015). AMQP supports reliable communication via directives in terms of
at-most-once, at-least-once and exactly once-delivery. Unlike MQTT, it
Apple Academic Press
Author Copy
For Non-Commercial Use
140
The Evolution of Business in the Cyber Age
makes use of TCP for message exchange. In AMQP protocol, all types of
exchanges are handled by two main components: Exchanges and message
queues (Figure 6.12).
FIGURE 6.12 AMQP protocol working.
(Source: Electronics for You, (2018). AMQP. Retrieved from: https://iot.electronicsforu.
com/research-articles/internet-things-protocols-landscape/2/.)
The exchanges perform the task of message routing and all messages
are stored in message queue before they are routed to the receiver. It is
mostly found in business messaging. It denes “devices” as mobile units
communicating at back-end data centers.
DDS (Data Distribution Service): This was proposed by Object
Management Group (OMG) for facilitating Machine to Machine commu-
nication and is regarded as yet another publishes/subscribes protocol
(Pardo-Castellote et al., 2005). Unlike MQTT, AMQP, and XMPP, DDS is
a highly reliable and secured protocol as it makes use of SSL and DTLS.
DDS has two levels of Interfaces-
o Data-Centric Publish-Subscribe (DCPS): DCPS, whose main
task is to assure ecient delivery of information to the designated
receivers.
o Data-Local Reconstruction Layer (DLRL): DLRL, which
facilitates easy integration with application layer.
DDS has 23 dierent levels of QoS like Security, Urgency, Priority,
Durability, Reliability, etc.
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 141
6.4.2 SIMULATION TOOLS FOR IOT-INTERNET OF THINGS
In order to implement newly designed protocols and IoT devices in real-
time, everything has to undergo a thorough stage of evaluation and testing
to determine the required capability and performance of the protocol and
device. The testing and evaluation is carried out by the variety of simula-
tion tools. Example: Testing a large number of IoT nodes is not practical
in the real world during the initial stages of design and exploration because
of financial and operational constraints, especially when the protocol reli-
ability, security, and utility are unknown. So, to overcome all these chal-
lenges, a Simulation tool is the only way out. A standardized research in
IoT starts with idea formulation and ends with real-world implementation
comprising both virtual and real entities. In order to test virtual entities,
a simulation and testbed is essential, but for real-world live scenarios are
required for final testing before launching it finally for the end-user.
In this section of the chapter, we explore some simulators especially
designed for IoT which can lay a strong foundation for researchers to
perform novel research, propose novel designs cum architectures and
protocols to extend IoT technology.
Bevywise IoT Simulator: It is free IoT simulation suite which
facilitates researchers to design, test, and emulate real-time IoT Devices,
middleware, and management solutions (Bevywise, 2018). The simulator
can simulate few to thousands of IoT devices under single box. It facili-
tates simulation of Smart Buildings, Smart Cities, Smart Manufacturing,
Smart Farming, Healthcare devices and many more. Features:
o Simple and Intuitive GUI Interface for easy operations.
o Fully support MQTT protocol.
o Powerful Python programming support to program user-custom-
ized messages for real-time transmission.
o Support for WILL topic and retain messages.
o REST-based APT for full simulation integration.
o Highly scalable, robust, and throughput oriented.
IoTIFY: It is a cloud-based simulation platform for IoT facilitating
the user to design production-ready IoT and blockchain in web browser
(IoTIFY, 2018). It facilitates the user to design and develop powerful
simulations with regard to blockchain wallets, autonomous vehicles, smart
cities, smart meters, smart hospitals and many more.
Features:
Apple Academic Press
Author Copy
For Non-Commercial Use
142
The Evolution of Business in the Cyber Age
o Easy design of IoT device models using JavaScript-based
templates.
o Directs the virtual IoT devices to all types of cloud-Amazon AWS,
Azure, IBM Bluemix, and Google Cloud.
o Supports tons of protocols-MQTT, CoAP, UDP, TCP, DTLS, TLS,
HTTP, etc.
o Facilitates generation of specic tokens based for devices for
performing all sorts of registration and provisioning.
o Facilitates users to perform research on tons of varied network
conditions to determine throughput and latency.
CupCarbon U-One: CupCarbon is a discrete wireless sensor
network and IoT simulator, which is multi-agent and performs geoloca-
tions-based simulations (CupCarbon, 2017; Mehdi et al., 2014). It enables
to users to run simulations and keep close eye on varied events changing
over time. It is well-facilitated simulator for IoT and can simulate smart
cities along with Unmanned Aerial Vehicles (UAVs) and detailed street-
level topology and maps belonging to real-world. It oers users to create
paths, open or congested roads and agent’s assignments to make them
mobile. Trajectories are generated in two ways: Manual or Automatic.
Cup carbon simulator has for modules:
o Agent Module: Includes devices and events to simulate WSN and
congure simulator for performing simulations.
o OpenStreetMap: Deploying wireless sensors on the map.
o WiSen Simulator Module: Simulate WSN and connected to all
agents of the simulator.
o Solver Module: Integrates all sorts of algorithms like Routing,
Coverage, etc.
Features:
o Interactive and highly simple GUI interface for users to perform
all sorts of simulations based on JavaFX.
o Simple script language based on SenScript which also facilitates
interactive commands.
o 2D/3D Visualization with OpenStreetMap.
o Facilitates Automation and repeated tasks using CupCarbon
Scripts.
o Arduino/XBee code generation.
o Integrates various radio modules and standards like 802.15.4,
ZigBee, Wi-Fi, and LoRa.
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 143
o Intelligent Mobility models for running comprehensive
simulations.
SimpleIoTSimulator: It creates a powerful and highly interac-
tive work environment for end-users to simulate hundreds or thousands
of sensors and gateways on a single computer (SimpleSoft, 2018). The
simulator supports tons of common IoT protocols like HTTP, HTTPS,
MQTT, MQTT-SN, CoAP, etc. The simulator can easily adapt to changing
customer requirements and create powerful replica of real-time scenarios.
The simulator supports both IPv4 and IPv6 protocols to simulating sensors
in constrained environments. Features are:
o Built-in learner utilities to make SimpleIoTSimulator to learn
more IoT scenarios.
o Powerful enough to simulate thousands of sensor nodes and gate-
ways to single simulator.
o Easy generation of user-based scripts to generate real-time
scenarios, modications, and dynamic changing properties.
o Realistic simulations with easy to use GUI interface.
o Supports almost every IoT standard protocol along with IPv4 and
IPv6.
o Supports other management protocols like SNMP, Telnet, SSH,
etc.
o Real-time sensor data modications as per changing operational
scenarios.
MIMIC IoT Simulator: MIMIC IoT simulator provides a strong
real-world replica of operational test environment for managing all types
of IoT based sensors, gateways, and devices to test the IoT environment
(Gambit Communications, 2018). The simulator is fully competent to
simulate various scenarios like: Industry 4.0, Smart Factories, Smart
Cities and Agriculture. It is regarded as fully loaded simulator and bundles
almost types of applications, Middleware’s, Brokers, Load Balancers,
MQTT gateways and clients. MIMIC IoT Simulator has the following
main components:
o MQTT Simulator: It is fully equipped to simulate almost
1,00,000 MQTT v3.1 and MQTT 3.1.1 based sensors and devices.
Every device has a unique IP Address, Port, and Address. Once
the simulation scenario is created and started, every device can
Apple Academic Press
Author Copy
For Non-Commercial Use
144
The Evolution of Business in the Cyber Age
respond to all sorts of MQTT requests to and fro from a broker or
application from the network.
o HTTP/REST Simulator: All the sensors can communicate using
HTTP/HTTPS/REST. Every device is fully ecient to respond to
REST requests to any application from anywhere in work.
o CoAP Simulator: MIMIC can simulate tons of CoAP enabled
devices managed by one or more clients.
o Modbus Simulator: It facilitates the creation of Modbus slave
devices to communicate with Modbus Master Server using TCP
protocol. Every slave has a unique IP address that can request to
server and respond accordingly.
o MIMIC Shell: Main controller of all activities of MIMIC
commands using commands and even equipped with GUI
interface.
In addition to above, MIMIC also allows the users to simulate SNMP
v1, SNMPv2c, SNMPv3, NetFlow, sFlow, IPMI, Cisco IOS, Juniper
JUNOS, Telnet/SSH based devices.
Features:
o Facilitates creation of dynamic scenarios of Smart Cities, Industry
4.0 and other IoT based environments.
o Tons of IoT sensors can be simulated with an almost exact replica
of real-world.
o Facilitates reliable testing and scalability of sensors.
o Handles all sorts of connections and scenarios with regard to
heterogeneous environments.
Cooja: It is regarded as Contiki network emulator-An exten-
sible Java-based simulator for emulating Tmote Sky and other nodes
(Mehmood, 2017; Nayyar and Singh, 2015; Thiruveedula, 2017; Bagula
and Erasmus, 2015). It is basically an operating system for simulating
resource-constrained and networked low-power IoT devices. It facilitates
multitasking and contains a fully equipped TCP/IP suite. It consists of a
powerful built-in suite for simulating and constructing powerful network
scenarios. Contiki supports IPv4; IPv6 along with various IoT based
protocols like: 6LoWPAN, RPL, CoAP. Cooja supports three dierent
levels of simulation -
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 145
Networking/Application Level: Cooja facilitates the users
to exchange all sorts of simulator modules like device drivers or radio
medium modules.
Operating System Level: Cooja simulates OS via execution of
native operating system code. All sorts of user processes are executed to
alter Contiki core functionality.
Machine Code Instruction Set Level: It facilitates new nodes
creation under varied structures as compared to standard nodes.
Features:
o Highly memory ecient and contains a dened set of mechanisms
for memory allocation like Memory block allocation memb,
managed memory allocator mmem, and C memory allocator
malloc.
o Fully operational IP network stack with almost all standard proto-
cols of networks TCP, UDP, and HTTP along with IoT protocol
stack.
o Fully support low-power devices simulation and gives a precision
estimation of nodes power utilization.
o Fully support dynamic loading and modules linking at simulation
run-time. The module load faster and link standard ELF les.
o Supports platforms like 8051, MSP430, ARM, and AVR devices.
o Supports commands via optional shell.
6.5 CONCLUSION
In view of the above arguments that support an exclusive discussion on IoT
and Digital Business Environment inclusive Cyber Space, Cyber Crimes
and Cybersecurity paradigm. Even though there was evidence of such
increased concerns about the cybercrime, cyber threat, risk approaching
from cyberspace along with the idea of serious cyberattacks from time to
time against decisive infrastructure perceived by top-notch agencies glob-
ally in digital business. Regarding social and sustainable business, positive
benefits from cyberspace are essential under ethical circumstances and
codes; however, acknowledges the threats related to cyberspace. More-
over, it highlights cyber world importance, even though more concerned is
still focused on connecting the opportunities connected to cyberspace and
minimizes the threats in today’s competitive world.
Apple Academic Press
Author Copy
For Non-Commercial Use
146
The Evolution of Business in the Cyber Age
KEYWORDS
cybersecurity
digital business environment
internet of things (IoT)
IoT protocols
IoT security
message queuing telemetry transport (MQTT)
simulation tools
REFERENCES
Abera, T., Asokan, N., Davi, L., Koushanfar, F., Paverd, A., Sadeghi, A. R., & Tsudik, G.
(2016, June). Things, trouble, trust: on building trust in IoT systems. In Proceedings of
the 53rd Annual Design Automation Conference (p. 121). ACM.
ABI Research, (2014). Retrieved from: https://www.abiresearch.com/press/the-internet-
of-things-will-drive-wireless-connect (Accessed on 28 August 2019).
Adame, T., Bel, A., Bellalta, B., Barcelo, J., & Oliver, M., (2014). IEEE 802.11 AH: The
Wi-Fi approach for M2M communications. IEEE Wireless Communications, 21(6),
144–152.
Aijaz, A., Su, H., & Aghvami, A. H., (2015). CORPL: A routing protocol for cognitive
radio enabled AMI networks. IEEE Trans. Smart Grid, 6(1), 477–485.
Alliance, Z. W., (2013). About Z-Wave Technology. Z-Wave Alliance, Tech. Rep. https://z-
wavealliance.org/about_z-wave_technology/ (Accessed: December 2018)
Alliance, Z. W., (2015). Z-wave. Retrieved from: https://www.z-wave.com/ (Accessed:
December 2018)
Appazov, A., (2014). Legal Aspects of Cybersecurity. University of Copenhagen. Retrieved
from: http://justitsministeriet.dk/sites/default/files/media/Arbejdsomraader/Forskning/
Forskningspuljen/Legal_Aspects_of_Cybersecurity.pdf (Accessed on 28 August 2019).
Atzori, L., Iera, A., & Morabito, G., (2010). The Internet of Things: A Survey (pp.
2787–2805). In Computer Networks.
Ayoub, W., Mroue, M., Nouvel, F., Samhat, A. E., & Prévotet, J. C., (2018). Towards
IP over LPWANs technologies: LoRa WAN, DASH7, NB-IoT. In: Digital Information,
Networking, and Wireless Communications (DINWC), Sixth International Conference
(pp. 43–47). IEEE.
Bagula, B., & Erasmus, Z., (2015). IoT Emulation with Cooja. In ICTP-IoT workshop.
Balakrishna, C., (2012). Enabling technologies for smart city services and applications.
In: 6th International Conference on Next Generation Mobile Applications, Services and
Technologies (NGMAST) (pp. 223–227).
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 147
Basagni, S., Petrioli, C., Petroccia, R., & Spaccini, D., (2015). CARP: A channel-aware
routing protocol for underwater acoustic wireless networks. Ad Hoc Networks, 34,
92–104.
Belissent, J., (2010). Getting Clever About Smart Cities: New Opportunities Require New
Business Models.
Bevywise, (2018). Retrieved from: https://www.bevywise.com (Accessed on 28 August
2019).
Bo, Y., & Wang, H., (2011). The application of cloud computing and the internet of things
in agriculture and forestry. In: International Joint Conference on Service Sciences
(IJCSS), 168–172.
Bormann, C., Castellani, A. P., & Shelby, Z., (2012). Coap: An application protocol for
billions of tiny internet nodes. IEEE Internet Computing, 16(2), 62–67.
Bormann, C., Lemay, S., Tschofenig, H., Hartke, K., Silverajan, B., & Raymor, B., (2018).
CoAP (Constrained Application Protocol) Over TCP, TLS, and WebSockets (No. RFC
8323).
Boyd, D., & Crawford, K., (2012). Critical questions for big data: Provocations for a
cultural, technological, and scholarly phenomenon. Information, Communication &
Society 15(5), 662–679.
Bryant R, Katz RH and Lazowska ED (2008) Big-data computing: Creating revolutionary
breakthroughs in commerce, science and society. In: Computing Research Initiatives for
the 21st Century, Computing Research Association, Ver. 8. Available at: http://www.cra.
org/ccc/docs/init/Big_Data.pdf
Camarinha-Matos, L. M., Tomic, S., & Graça, P., (2013). Technological innovation for the
internet of things: 4th IFIP WG 5.5/SOCOLNET. Doctoral Conference on Computing,
Electrical and Industrial Systems, DoCEIS, Costa de Caparica, Portugal, Proceedings
(Vol. 394). Springer.
Chen, H., Chiang, R. H., & Storey, V. C., (2012). Business intelligence and analytics: From
big data to big impact. MIS Quarterly, 36(4), 1165–1188.
CoAP, (2016). Retrieved from: http://coap.technology (Accessed on 28 August 2019).
CupCarbon., (2017). Cup Carbon U-One 3.8: A Smart City & IoT Wireless Sensor Network
Simulator. Retrieved from: http://www.cupcarbon.com (Accessed on 28 August 2019).
Das, K., & Havinga, P., (2012). Evaluation of DECT-ULE for robust communication
in dense wireless sensor networks. In: Internet of Things (IoT), 3rd International
Conference (pp. 183–190). IEEE.
Duan, L., Street, W. N., & Xu, E., (2011). Healthcare information systems: Data mining
methods in the creation of a clinical recommender system. Enterprise Information
Systems, 5(2), 169–181.
Dujovne, D., Watteyne, T., Vilajosana, X., & Thubert, P., (2014). 6TiSCH: Deterministic
IP-enabled industrial internet (of things). IEEE Communications Magazine, 52(12),
36–41.
Färber, F., Cha, S. K., Primsch, J., Bornhövd, C., Sigg, S., & Lehner, W., (2012). SAP
HANA database: Data management for modern business applications. ACM Sigmod
Record, 40(4), 45–51.
Gambit Communications, (2018). MIMIC IoT Simulator. Retrieved from: https://www.
gambitcomm.com/site/iot_simulator.php (Accessed on 28 August 2019).
Apple Academic Press
Author Copy
For Non-Commercial Use
148
The Evolution of Business in the Cyber Age
Gölzer, P., Cato, P., & Amberg, M. (2015, May). Data Processing Requirements of Industry
4.0-Use Cases for Big Data Applications. In ECIS.
Gomes, T., Salgado, F., Pinto, S., Cabral, J., & Tavares, A., (2018). A 6LoWPAN accelerator
for internet of things endpoint devices. IEEE Internet of Things Journal, 5(1), 371–377.
Gomez, C., & Paradells, J., (2010). Wireless home automation networks: A survey of
architectures and technologies. IEEE Communications Magazine, 48(6).
Gómez, C., Paradells, J., Bormann, C., & Crowcroft, J., (2017). From 6LoWPAN to 6Lo:
Expanding the universe of IPv6-supported technologies for the internet of things. IEEE
Communications Magazine, 55(12), 148–155.
Gopalkrishnan, V., Steier, D., Lewis, H., & Guszcza, J., (2012). Big data, big business:
Bridging the gap. In: Proceedings of the 1st International Workshop on Big Data,
Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models
and Applications (pp. 7–11). ACM.
Grimmer, J., (2015). We are all social scientists now: How big data, machine learning, and
causal inference work together. PS: Political Science & Politics, 48(1), 80–83.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M., (2013). Internet of things (IoT):
A vision, architectural elements, and future directions. Future Generation Computer
Systems, 29(7), 1645–1660.
Gui, Z., Yu, M., Yang, C., Jiang, Y., Chen, S., Xia, J., & Huang, Q., (2016). Developing
sub-domain allocation algorithms based on spatial and communicational constraints to
accelerate dust storm simulation. PloS One, 11(4), e0152250.
Hassan, S. M., Ibrahim, R., Bingi, K., Chung, T. D., & Saad, N., (2017). Application of
wireless technology for control: A wireless HART perspective. Procedia Computer
Science, 105, 240–247.
Heffner, J., (2014). Predictive policing. GEO: Geoconnexion Internal, 13(7), 20–23.
Homeplug Alliance Kit, (2018). Retrieved from: http://www.homeplug.org/media/filer_
public/79/fb/79fbf901-d875–475f-9abc-8a272329f4e2/homeplug_press_kit_091114.
pdf (Accessed on 28 August 2019).
Hori, M., Kawashima, E., & Yamazaki, T., (2010). Application of cloud computing to
agriculture and prospects in other fields. Fujitsu Scientific & Technical Journal, 46(4),
446–454.
Hossain, M. M., Fotouhi, M., & Hasan, R., (2015). Towards an analysis of security issues,
challenges, and open problems in the internet of things. In: Services (SERVICES), IEEE
World Congress on (pp. 21–28).
Hsu, M. H., (2008). A personalized English learning recommender system for ESL students.
Expert Systems with Applications, 34(1), 683–688.
Indeck, R. S., & Indeck, D. M., (2012). U.S. Patent No. 8,156,101. Washington, DC: U.S.
Patent and Trademark Office.
IoTIFY, (2018). Retrieved from: https://iotify.io (Accessed on 28 August 2019).
Jalali, A., Olabode, O. A., & Bell, C. M., (2012). Leveraging cloud computing to address
public health disparities: An analysis of the SPHPS. Online Journal of Public Health
Informatics, 4(3), 1–7.
Jan, S. R., Khan, F., Ullah, F., Azim, N., & Tahir, M., (2016). Using CoAP protocol for
resource observation in IoT. International Journal of Emerging Technology in Computer
Science & Electronics, ISSN, 0976–1353.
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 149
Javed, F., Afzal, M. K., Sharif, M., & Kim, B. S. (2018). Internet of Things (IoT) operating
systems support, networking technologies, applications, and challenges: A comparative
review. IEEE Communications Surveys & Tutorials, 20(3), 2062-2100.
Jiang, S., Fang, L., & Huang, X., (2009). An idea of special cloud computing in forest
pests’ control. In: Cloud Computing (pp. 615–620). Springer Berlin Heidelberg.
Jin, J., Gubbi, J., Marusic, S., & Palaniswami, M., (2014). An information framework for
creating a smart city through internet of things. IEEE Internet of Things Journal, 1(2),
112–121.
Kagermann, H., Helbig, J., Hellinger, A., & Wahlster, W., (2013). Recommendations
for Implementing the Strategic Initiative INDUSTRIE 4.0: Securing the Future of
German Manufacturing Industry. Final Report of the Industry 4.0 Working Group.
Forschungsunion.
Khan, R., Khan, S. U., Zaheer, R., & Khan, S., (2012). Future internet: The internet of
things architecture, possible applications and key challenges. In: Proceedings of the 10th
International Conference on Frontiers of Information Technology (FIT) (pp. 257–260).
Kivinen, T., & Kinney, P., (2017). IEEE 802.15. 4 Information element for the IETF (No.
RFC 8137).
Krogh, B. H. (2008). Cyber Physical Systems: The Need for New Models and Design
Paradigms. Presentation Report.
Lampos, V., & Cristianini, N., (2010). Tracking the flu pandemic by monitoring the social
web. In: 2010 2nd International Workshop on Cognitive Information Processing (CIP)
(pp. 411–416). IEEE.
LAN/MAN Standards Committee, (2003). Part 15.4: Wireless Medium Access Control
(MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area
Networks (LR-WPANs). IEEE Computer Society.
Light, (2017). Mosquitto: server and client implementation of the MQTT protocol. Journal
of Open Source Software, 2(13), 265, doi:10.21105/joss.00265.
Liu, X., Zhao, M., Li, S., Zhang, F., & Trappe, W., (2017). A security framework for
the internet of things in the future internet architecture. Future Internet, 9, 1–28; doi:
10.3390/fi9030027.
Lohr, S., (2012). The Age of Big Data (p. 11). New York Times.
Luzuriaga, J. E., Perez, M., Boronat, P., Cano, J. C., Calafate, C., & Manzoni, P., (2015).
A comparative evaluation of AMQP and MQTT protocols over unstable and mobile
networks. In: Consumer Communications and Networking Conference (CCNC) (pp.
931–936). 12th Annual IEEE.
Mashal, I., Alsaryrah, O., Chung, T. Y., Yang, C. Z., Kuo, W. H., & Agrawal, D. P., (2015).
Choices for interaction with things on internet and underlying issues. Ad. Hoc. Networks,
28, 68–90.
Mehdi, K., Lounis, M., Bounceur, A., & Kechadi, T., (2014). Cupcarbon: A multi-agent and
discrete event wireless sensor network design and simulation tool. In: 7th International
ICST Conference on Simulation Tools and Techniques (pp. 126–131). Lisbon, Portugal.
Institute for Computer Science, Social Informatics and Telecommunications Engineering
(ICST).
Mehmood, T., (2017). COOJA Network Simulator: Exploring the Infinite Possible Ways to
Compute the Performance Metrics of IOT Based Smart Devices to Understand the Working
of IOT Based Compression & Routing Protocols. arXiv preprint arXiv:1712.08303.
Apple Academic Press
Author Copy
For Non-Commercial Use
150
The Evolution of Business in the Cyber Age
Michael, K., & Miller, K., (2013). Big data: New opportunities and new challenges.
Computer, 46(6), 22–24.
Miller, L., (2016). IoT Security for Dummies, INSIDE Secure Edition. Retrieved from:
https://www.insidesecure.com/content/download/909/10066/file/IOT%2BSecurity%
2Bfor%2BDummies.pdf (Accessed on 28 August 2019).
Miorandi, D., Sicari, S., Pellegrini, F. D., & Chlamtac, I., (2012). Internet of things: Vision,
applications and research challenges. In Ad Hoc Networks, pp. 1497–1516.
Mitton, N., Papavassiliou, S., Puliafito, A., & Trivedi, K. S., (2012). Combining cloud and
sensors in a smart city environment. EURASIP Journal on Wireless Communications
and Networking, 1, 247.
Moniruzzaman, A. B. M., & Hossain, S. A., (2013). Nosql database: New era of databases
for big data analytics-classification, characteristics and comparison. International
Journal of Database Theory and Application, 6(4), 1–14.
Naik, N., (2017). Choice of effective messaging protocols for IoT systems: MQTT, CoAP,
AMQP and HTTP. In: Systems Engineering Symposium (ISSE) (pp. 1–7). IEEE.
Nayyar, A., & Singh, R., (2015). A comprehensive review of simulation tools for wireless
sensor networks (WSNs). Journal of Wireless Networking and Communications, 5(1),
19–47.
O’Donovan, P., Leahy, K., Bruton, K., & O’Sullivan, D. T., (2015). Big data in
manufacturing: A systematic mapping study. Journal of Big Data, 2(1), 1–22.
Ozturk, O., (2010). Introduction to XMPP protocol and developing online collaboration
applications using open source software and libraries. In: Collaborative Technologies
and Systems (CTS), International Symposium (pp. 21–25). IEEE.
Palmers, T., (2013). Implementing a vulnerability management process. SANS Institute
InfoSec Reading Room. Retrieved from: https://www.sans.org/reading-room/
whitepapers/threats/implementing-vulnerability-management-process-34180 (Accessed
on 28 August 2019).
Panwar, G., & Misra, S., (2017). Inside bluetooth low energy. IEEE Wireless
Communications, 24(4), 2, 3.
Pardo-Castellote G, Farabaugh B, Warren R: An Introduction to DDS and Data-Centric
Communications. Real-Time Innovations 2005.
Reddy, K. M., Kumar, K. N., & Vardhan, V. H., (2017). Analysis on securing the data over
the internet of things (IoT). International Journal of Scientific & Engineering Research,
8(5), 24–29.
Rose, K., Eldridge, S., & Chapin, L., (2015). The Internet of Things (IoT): An Overview-
Understanding the Issues and Challenges of a More Connected World. Internet
Society. October 2015. Available at: https://www.internetsociety.org/wp-content/
uploads/2017/08/ISOC-IoT-Overview-20151221-en.pdf
Said, O., & Masud, M., (2013). Towards internet of things: Survey and future vision.
International Journal of Computer Networks, 5(1), pp. 1–17.
Saint-Andre, P., (2011). Extensible Messaging and Presence Protocol (XMPP): Core (No.
RFC 6120).
Salman, T., & Jain, R., (2015). Networking protocols and standards for internet of things.
Internet of Things and Data Analytics Handbook, 215–238.
Apple Academic Press
Author Copy
For Non-Commercial Use
Internet of Things (IoT) and the Digital Business Environment 151
Salonen, J., (2017). Tietoturvaratkaisut (SSCP), TestOut Security Pro, web-based online
training. Helsinki Metropolia University of Applied Sciences. Retrieved from: https://
cdn.testout.com/client-v5–1–10–495/startlabsim.html? (Accessed on 28 August 2019).
Schaffers, H., Komninos, N., Pallot, M., Trousse, B., Nilsson, M., & Oliveira, A.,
(2011). Smart cities and the future internet: Towards cooperation frameworks for open
innovation. Future Internet Assembly, 6656: 431–446.
Sequeira, H., Carreira, P., Goldschmidt, T., & Vorst, P., (2014). Energy cloud: Real-time
cloud-native energy management system to monitor and analyze energy consumption in
multiple industrial sites. In: Proceedings of the IEEE/ACM 7th International Conference
on Utility and Cloud Computing (pp. 529–534). IEEE Computer Society.
Shelby, Z., Hartke, K., & Bormann, C., (2014). The Constrained Application Protocol.
https://tools.ietf.org/html/rfc7252 (CoAP) (No. RFC), 7252).
Shi, Y. R., & Hou, T. (2013). Internet of Things key technologies and architectures
research in information processing. In Applied Mechanics and Materials (Vol. 347, pp.
2511–2515). Trans Tech Publications.
Silva, B. N., Khan, M., & Han, K., (2018). Internet of things: A comprehensive review
of enabling technologies, architecture, and challenges. IETE Technical Review, 35(2),
205–220.
SimpleSoft, (2018). Simple IoT Simulator. Retrieved from: https://www.smplsft.com/
SimpleIoTSimulator.html (Accessed on 28 August 2019).
Singh, M., Rajan, M. A., Shivraj, V. L., & Balamuralidhar, P., (2015). Secure mqtt for
Internet of Things (IoT). In: Communication Systems and Network Technologies (CSNT),
5th International Conference (pp. 746–751). IEEE.
Suo, H., Wan, J., Zou, C., & Liu, J., (2012). Security in the internet of things: A review. In:
Computer Science and Electronics Engineering (ICCSEE) (pp. 648–651).
Suryadevara, N. K., & Mukhopadhyay, S. C., (2018). Internet of Things: A Review and
Future Perspective. Reliance. Available at: https://www.europeanbusinessreview.com/
internet-review-future-perspective/
Teplinsky, M., (2013). Fiddling on the Roof: Recent Developments in Cybersecurity. 2
American University Business Law Review.
Theodoridis E, Mylonas G, Chatzigiannakis I. Developing an IoT smart city framework.
In: Proceedings of 4th International Conference on Information Intelligence Systems and
Applications, Piraeus, 2013. 1–6.
Thiruveedula, B., (2017). IoT Network Testbed Simulation with Cooja. Retrieved from:
https://blog.imaginea.com/iot-network-testbed-simulation-with-cooja (Accessed on 28
August 2019).
Tosi, J., Taffoni, F., Santacatterina, M., Sannino, R., & Formica, D., (2017). Performance
evaluation of Bluetooth low energy: A systematic review. Sensors, 17(12), 2898.
Van-Den-Dam, R., (2013). Internet of things: The foundational infrastructure for a smarter
planet. In: Internet of Things, Smart Spaces, and Next Generation Networking (1–12).
Springer Berlin Heidelberg.
Vasseur, J. P., Agarwal, N., Hui, J., Shelby, Z., Bertrand, P., and Chauvenet, C., RPL: The
IP routing protocol designed for low power and lossy netwroks. Internet Protocol for
Smart Object (IPSO) Alliance, White Paper, Apr. 2011.
Vinoski, S. (2006). Advanced message queuing protocol. IEEE Internet Computing, (6),
87–89.
Apple Academic Press
Author Copy
For Non-Commercial Use
... Data is uploaded to the cloud for data storage through these applications. Some cloud-based Ag-IoT platforms are AgroCloud, AT and M2X cloud, AWS, Azure IoT hub, Blynk, Cropinfra, Dropbox, ERMES, FIWARE, freeboard, Google, GroveStream MACQU, Mobius, NETPIE, Rural IoT, self-developed, SmartFarmNET, ThingSpeak, Ubidots, Nimbits, ThingWorx and Phytech [43,74]. ...
... These cyber attacks have included case studies for IoT smart devices. In [74], the authors covered the simulation tools for the vulnerability assessment of holistic IoT devices, that is, Bevywise IoT Simulator, IoTIFY, CupCarbon U-One, Simple IoT Simulator, Mimic IoT Simulator, Cooja. To prevent cyber attacks, the authors suggested security measures, readiness and incident response model specific to Ag-IoT. ...
... Even though, cloud infrastructure is built virtualization that makes the network traffic betwixt virtual machines opaque and unmanageable by conventional intrusion detection systems [31]. The software define network is extensively used in cloud computing because of its programmability, centralized management and worldwide view [32]. The network traffic data can easily lead to a feature dimensionality then the high dimensionality and redundancy of features [33]. ...
Article
Full-text available
The cloud computing environment has been severely harmed by security issues, which has a negative impact on the healthy and sustainable development of the cloud. Intrusion detection technologies are protecting the cloud computing environment from malicious attacks. To overcome this problem, Variational auto encoder Wasserstein generative adversarial networks enhanced by Gazelle optimization algorithm embraced cloud intrusion detection (CIDF-VAWGAN-GOA) is proposed in this manuscript. Here, the data is collected via NSL-KDD dataset. Then the data is supplied to pre-processing. In pre-processing, it purges the redundancy and missing value is restored using Difference of Gaussian filtering. Then the pre-processing output is fed to the feature selection. In feature selection, the optimal feature is selected using archerfish hunting optimizer (AHOA). The optimal features based, data is characterized by normal and anomalous under VAWGAN. Generally, VAWGAN does not adopt any optimization techniques to compute the optimum parameters for assuring accurate detection of intruder in cloud intrusion detection. Therefore, in this work, GOA is used for optimizing VAWGAN. The proposed CIDF-VAWGAN-GOA technique is implemented in Python under NSL-KDD data set. The performance metrics, like accuracy, sensitivity, specificity, precision, F-Score, Computation Time, Error rate, AUC are examined. The proposed method provides higher recall of 17.58%, 23.18% and 13.92%, high AUC of 19.43%, 12.84% and 21.63% and lower computation Time of 15.37%, 1.83%,18.34% compared to the existing methods, like Cloud intrusion detection depending on stacked contractive auto-encoder with support vector machine (CIDF-SVM), Efficient feature selection with classification using ensemble method for network intrusion detection on cloud computing (CIDF-DNN) and Deep belief network under chronological salp swarm approach for intrusion detection in cloud utilizing fuzzy entropy (CIDF-DBN) respectively.
Article
The emergence of the Internet of Things (IoT) accelerated the implementation of various smart city applications and initiatives. The rapid adoption of IoT-powered smart cities is faced by a number of security and privacy challenges that hindered their application in areas such as critical infrastructure. One of the most crucial elements of any smart city is safety. Without the right safeguards, bad actors can quickly exploit weak systems to access networks or sensitive data. Security issues are a big worry for smart cities in addition to safety issues. Smart cities become easy targets for attackers attempting to steal data or disrupt services if they are not adequately protected against cyberthreats like malware or distributed denial-of-service (DDoS) attacks. Therefore, in order to safeguard their systems from potential threats, businesses must employ strong security protocols including encryption, authentication, and access control measures. In order to ensure that their network traffic remains secure, organizations should implement powerful network firewalls and intrusion detection systems (IDS). This article proposes a blockchain-supported hybrid Convolutional Neural Network (CNN) with Kernel Principal Component Analysis (KPCA) to provide privacy and security for smart city users and systems. Blockchain is used to provide trust, and CNN enabled with KPCA is used for classifying threats. The proposed solution comprises three steps, preprocessing, feature selection, and classification. The standard features of the datasets used are converted to a numeric format during the preprocessing stage, and the result is sent to KPCA for feature extraction. Feature extraction reduces the dimensionality of relevant features before it passes the resulting dataset to the CNN to classify and detect malicious activities. Two prominent datasets namely ToN-IoT and BoT-IoT were used to measure the performance of this anticipated method compared to its best rivals in the literature. Experimental evaluation results show an improved performance in terms of threat prediction accuracy, and hence, increased security, privacy, and maintainability of IoT-enabled smart cities.
Book
Full-text available
Buku ini disusun untuk memberikan pemahaman dan panduan praktis tentang bagaimana membangun bisnis yang sukses di era digital. Penulis mencoba untuk menjelaskan konsep-konsep teknis secara sederhana, dan memberikan banyak contoh praktis tentang cara menerapkannya dalam bisnis Anda. Tujuan utama dari buku ini adalah untuk membantu Anda memperluas pengetahuan Anda tentang teknologi digital dan membantu Anda mengembangkan strategi bisnis yang efektif dan efisien Buku "Bisnis Digital" membahas tentang strategi administrasi bisnis digital untuk menghadapi masa depan yang semakin digital. Buku ini ditulis tim dosen dan beberapa penulis yang ahli di bidang bisnis digital dan teknologi informasi. Buku ini membahas tentang konsep dasar bisnis digital, termasuk Strategi Bisnis Digital, dan bagaimana Memulai Bisnis Digital era sekarang. Lebih lengkap Buku ini mengulas secara tuntas bagaimana Mengembangkan produk atau layanan digital, Pengembangan Bisnis Digital, Pemanfaatan Jaringan Internet, Menghadapi Tantangan Bisnis Digital, Mempertahankan keamanan dan privasi online, Persaingan dan inovasi di pasar digital, Mengelola risiko dan kegagalan dalam bisnis digital dan Masa Depan Bisnis Digital
Chapter
For the past decades, cyber threats have been increasing significantly and are designed in a sophisticated way that is tough to detect using traditional protection tools. As a result, privacy and sensitive personal information such as credit card numbers are being continuously compromised. Therefore, it is time to find a solution that can stand against the spreading of such threats. Artificial intelligence, machine learning, and deep learning could be among the top methods of detecting cyber threats. These methods could help to improve the detection technologies and engines for computer network defense. This chapter mainly focuses on artificial intelligence in cybersecurity. The main goal of this chapter is to highlight the drawbacks of the traditional security protection tools and discuss the improvements that has been made so far by applying artificial intelligence to solve the current cybersecurity problems.
Chapter
Industry 4.0 is the present proclivity of automation to create “Smart Industry” with different technologies such as Internet of Things, Cloud Computing, Big Data, Cyber Security etc. Industries are in urge to increase their revenue by understanding the advantages of smart factories and smart manufacturing. Artificial Intelligence can be defined as a study and design of intelligent systems which act on the environment to do some actions and maximize its probability of success rate. Artificial Intelligence when used in combination with Industry 4.0 makes the dream of converging man and machine together for digital transformation of the industry. Neural Networks, Deep-Learning and Reinforcement Learning along with Cognitive technologies can be used to design intelligent machines with natural language processing, thus empowering the efficiency of the system. Economists say Industry 4.0 with AI will bring the digital world true across the world by increasing the profits of industry. It is estimated that the global manufacturing market will have an annual income rate of $320 by 2021 with the increased numbers of robots in the process of Industrial Automation and Digital Transformation. Industry 4.0 with AI has got off the ground with lots of innovation, creating opportunities and challenges in industry to redesign the business process. The objective of this chapter is to provide the basic idea of Industry 4.0 with its application, challenges identified while implementing industry 4.0. This chapter also relies on new trends to Industry 4.0 with Artificial Intelligence. Also discussed AI algorithms implemented in the flourishing smart industry.
Chapter
Full-text available
The era of fourth Industrial revolution, Industry 4.0, is bringing in new aspects in industrial practices as well as management of value chain. Additive Manufacturing (AM), popularly known as 3D printing is playing transformative role in Industrial Revolution 4.0 and bringing revolutionary changes in manufacturing landscape of Indian industries. 3D painting uses Computer Aided Designs (CAD) to create three dimensional objects through layering materials. The businesses across the globe are recalibrating their supply chain management and reorganising manufacturing order, this provides tremendous opportunities to Indian industries to strengthen its value proposition and realign its global positioning by adopting integrated approach to AM across all segments like public sector, defence, automotive, electronics, manufacturing and especially MSME. Indian MSME sector is comprising of 51 million units and form backbone of industrial landscape. As the world is heading towards Industry 4.0, the MSME sector is required to pay utmost attention to manufacture superior quality and technological products. The Zero effect and Zero-defect goal can be achieved by use of 3D printing to minimise the cost as well time for MSMEs. The present chapter aims at creating theoratical background of 3D printing including types, material, processes, Indian and Global scenario with special focus on case study on application of AM during COVID-19.
Chapter
Additive Manufacturing (AM) technologies are one of the major trends in the world of new technological solutions. They are often considered to be one of the fundamental building blocks of the Fourth Industrial Revolution. The use of computer-aided design (CAD) to create three-dimensional models with complex geometries without material waste takes this technology to a higher level of automated manufacturing elements with high repeatability. AM technologies offer many techniques that vary depending on the material used. One of them is an extrusion-based technique, which relies on hydrogel processing. Sodium alginate, due to its bioactive properties is a material that has a growing interest in biomedical engineering. Therefore, there are attempts to use it in AM technologies as a hydrogel ink. However, its rheological properties hinder the manufacturing process, causing spilling and loss of shape. Material additives to the hydrogel, or techniques such as support-bath or sacrificial material, providing an outline for the printed material, are solutions that increase the accuracy of produced of produced with sodium alginate objects until they are cross-linked with agents, for example divalent cations. In this chapter, the possibilities of using hydrogel inks based on sodium alginate in additive manufacturing technologies for biomedical applications are presented. Methods that ensure the shape stabilization of the material flowing from the nozzle are presented and compared. The development of these methods will enable improvement of manufacturing processes and simultaneously processing of hydrogel materials. In the future, sodium alginate, a material with great potential, can be used for the fabrication of new generation products with smaller size and more accurate dimensional and shape representation. In many developing countries export earnings account for a large percentage of the country Gross Domestic Product (GDP), government revenues and expenditures and public investment. High dependency on a limited number of commodities for export increases the economy vulnerability to price fluctuations in the global markets. Not only instability in export earnings reduces the ability of the economy to finance development, but also increases uncertainty about future growth. Economic diversification underscores the importance of productivity growth to balance development and reduce dependency on international markets. The new economy, driven by digital technologies could help developing countries diversify output and foster economic growth. Building capacity for digital development enhances the country capabilities to promote innovation, create knowledge and disseminate information. Digital networks increase communication as well as allow people, regions and nations to collaborate and share information aiming at fostering growth and sustaining development. For developing countries, external knowledge enhances the economy readiness to diversify output, create employment opportunities and improve global competitiveness.
Chapter
Full-text available
There is tremendous pressure on mutual fund investment firms and investors experienced during the investment to outperform and moderate risk for their assets. But due to the large fluctuation relative to the investment company and another factor affecting overall GDP, it has now become more complex to predict future mutual fund returns. The fund managers managing the portfolio must know all the different options for investment and how to choose them for the purpose of achieving the overall objectives. Industry 4.0 plays an important role in taking care of business while we invest money in the mutual fund industry. In this paper, we briefly introduce the mutual fund with state of an art review of different aspects of the analysis and performance measures associated with the mutual fund investments. We introduce the application of Artificial Intelligence, Machine Learning, and Neural networks and present a draft for a mutual fund recommendation model for optimal investment decisions for individuals. We will also target upcoming changes and identify possible areas for improvement including deployment of industry 4.0 recommendations in the field of Mutual Fund Investment. A case study of three mutual funds was taken into consideration and some conclusions are drowning from this study. In the future, we can enhance the prediction model using other advanced technologies.
Article
Full-text available
INTRODUCTION. In the modern world, the number of crimes committed in cyberspace has significantly increased. New types of malware used to achieve illegal goals appear regularly. According to experts, the material damage to the global economy from crimes committed with the help of information and communication technologies amounts to trillions of US dollars. Such a scale requires effective means of legal regulation of relations in cyberspace. Cybersecurity is considered one of the most relevant topics of current international law, which is extremely important for ensuring the national security of states. Information and communication technologies can be used to negatively affect economic, social, cultural and political relations, to damage the economic, military, and defense potential of the state and society. In this regard, the international community is deeply interested in developing a multilateral legal framework for cooperation in the field of cybersecurity. However, a unified approach to solving this problem in the international arena has not yet been developed. Legal regulation of cyberspace is very complex due to the virtual interface characteristics of this area. MATERIALS AND METHODS. The material for the study is the works of Russian and foreign researchers in the field of international law, international legal acts adopted in the framework of the UN and the European Union, draft UN conventions, national regulatory legal acts of the Russian Federation, the People’s Republic of China and other states as well as judicial practice of international courts. Th research methodology is based on general and specific scientific methods of cognition (the dialectical method, methods of analysis and synthesis, deduction and induction, comparative legal and historical legal methods). RESEARCH RESULTS. The analysis showed that despite the applicability of the principles and rules of current international law to the information sphere, the universalization of the international legal regulation of cyberspace is required, taking into account its characteristics and in order to effectively combat the use of information and communication technologies for illegal purposes. The efforts of states to develop special rules of conduct in cyberspace are currently concentrated on a narrow sphere of issues related to human rights, data privacy, etc. Not all states are interested in creating a modern and effective mechanism for cooperation in cyberspace. Many states are openly opposing the development of new international legal instruments. For this reason, the Russian initiative to adopt the UN Convention on Cooperation in Combating Information Crimes has not been support-ed. This fact has entailed the absence of a full-fledged universal international legal framework for cooperation in the field of cyberspace. DISCUSSION AND CONCLUSIONS. Based on the analysis of doctrine and practice, the authors conclude that there is a need to create a universal international legal framework for cooperation in the fi ld of cyberspace. In modern international law, cybersecurity is one of the most pressing problems directly related to state security. The difference in the approaches of states to the problem of ensuring cybersecurity at the present stage entails the absence of an effective multilateral legal framework for cooperation in this area.
Article
Full-text available
The trend towards adoption of Wireless Sensor Networks is increasing in recent years because of its diverse use in various fields. Wireless Sensor Network is formed via interconnection of large number of sensor nodes. Each and every sensor node deployed in network monitors various parameters like Temperature, Humidity, Ambient Light, Gas etc. and send the data to the master node. Despite of several applications and diverse uses, sensor networks face various shortcomings like energy, localization, security, self-organization, fault tolerance and many more. So, the area of Wireless Sensor Network is under rigorous research and development by various researchers across the globe to develop new algorithms, protocols and techniques to make WSN network more efficient and reliable. Before live implementation, testing of the developed technique requires rigorous testing. But it is not always possible to have live sensor network environment. So, in that case, Simulation is the only way to test the research before moving towards live implementation. Large numbers of simulation tools are available for WSN network till date, out of which some are dedicated towards wireless sensor networks and some for both wireless and wired networks. The main objective behind this research paper is to do a comprehensive review of various simulation tools of Wireless Sensor Networks to enable researcher to select the most competent tool for simulating wireless sensor networks and testing the research proposed. A comprehensive review of 31 WSN simulators is being presented along with their respective features comparison to assist researchers in advanced WSN based research.
Article
Full-text available
The Internet of things (IoTs) has become a reality. As the IoTs is now becoming a far more common field, the demand for IoTs technologies to manage the communication of devices with the rest of the world has increased. The IoTs is connecting various individual devices called Things and wireless sensor networks (WSNs) is also playing an important role. A Thing can be defined as an embedded device based on a micro controller that can transmit and receive information. These devices are extremely low in power, memory, and resources. Therefore, the research community has recognized the importance of IoTs device operating systems (OSs). An adequate OS with a kernel, networking, real-time capability, and more can make these devices flexible. This review provides a detailed comparison of the OSs designed for IoTs devices on the basis of their architecture, scheduling methods, networking technologies, programming models, power and memory management methods, together with other features required for IoTs applications. In addition, various applications, challenges, and case studies in the field of IoTs research are discussed.
Article
Full-text available
Leveraging 6LoWPAN, the IETF 6Lo working group has targeted adaptation of IPv6 over a new generation of communication technologies for the IoT. These comprise Bluetooth LE, ITU-T G.9959, DECT ULE, MS/TP, NFC, IEEE 1901.2, and IEEE 802.11ah. This paper comprehensively analyzes the 6Lo technologies and adaptation layers, giving the motivation for critical design decisions, highlighting crucial aspects for performance, and presenting main challenges.
Article
Full-text available
The Internet of Things (IoT) is a recent trend that extends the boundary of the Internet toinclude a wide variety of computing devices. Connecting many stand-alone IoT systems throughthe Internet introduces many challenges, with security being front-and-center since much of thecollected information will be exposed to a wide and often unknown audience. Unfortunately,due to the intrinsic capability limits of low-end IoT devices, which account for a majority of theIoT end hosts, many traditional security methods cannot be applied to secure IoT systems, whichopen a door for attacks and exploits directed both against IoT services and the broader Internet.This paper addresses this issue by introducing a unified IoT framework based on the MobilityFirstfuture Internet architecture that explicitly focuses on supporting security for the IoT. Our designintegrates local IoT systems into the global Internet without losing usability, interoperability andsecurity protection. Specifically, we introduced an IoT middleware layer that connects heterogeneoushardware in local IoT systems to the global MobilityFirst network. We propose an IoT name resolutionservice (IoT-NRS) as a core component of the middleware layer, and develop a lightweight keyingprotocol that establishes trust between an IoT device and the IoT-NRS.
Chapter
Full-text available
This chapter highlights Internet of Things (IoT) protocols that are operating at different layers of the networking stack, including Medium Access Control (MAC) layer, network layer, and session layer. Generally, the most widely used standards in IoT are Bluetooth and ZigBee. IEEE 802.11ah, on the other hand, is the easiest to be used due to the existing and widely separated infrastructure of IEEE 802.11 which is the most used infrastructure in other wireless applications. The chapter discusses some standard and non-standard protocols that are used for routing in IoT applications. Low-Power and Lossy Networks (RPL) is the most commonly used routing protocols in IoT. Cognitive RPL (CORPL) is a non-standard extension of RPL that is designed for cognitive networks. Security is an aspect of IoT applications which is critical and can be found in all almost all layers of the IoT protocols. The chapter also discusses the security mechanisms built in the IoT protocols.
Article
Full-text available
Process monitoring and automation in the industrial sector are hitherto done over wired connection between devices. It is evident that the amount of wires required increased proportionally to the complexity of the industry and their installation is time consuming. The wires used in the industry must withstand the harsh environmental conditions, hence expensive to install and maintain. In the event of loss of connection due to accident or any other reason, the cost incurred as a result of the downtime is high. The highlighted problems necessitated the need for an open, interoperable wireless standard like WirelessHART that can overcome these problems. Three categories of applications running in any process plant with increment of criticality are for monitoring, control and safety. The current application of wireless technology including WirelessHART in the industry so far is limited to monitoring and some attempts are being made to apply it for control. This paper examines the extent to which WirelessHART technology is applied especially for the purpose of control.
Article
The Internet of Things (IoT) is revolutionizing the Internet of the future and the way smart devices, people and processes interact with each other. Challenges in endpoint devices communication are due not only to the security and privacy-related requirements but also due to the ever-growing amount of data transferred over the network that needs to be handled, which can considerably reduce the system availability to perform other tasks. This article presents a 6LoWPAN accelerator for the IP-based IoT networks, which is able to process and filter IPv6 packets received by an IEEE 802.15.4 radio transceiver without interrupting the microcontroller. It offers nearly 13.24% of performance overhead reduction for the packet processing and the address filtering tasks, while guaranteeing full system availability when unwanted packets are received and discarded. The contribution is meant to be deployed on heterogeneous endpoint devices at the network edge, which include on the same architecture, field-programmable gate array (FPGA) technology beside a microcontroller and an IEEE 802.15.4-compliant radio transceiver. Performed evaluations include the low FPGA hardware resources utilization and the energy consumption analysis when the processing and accepting/rejection of a received packet is performed by the 6LoWPAN accelerator.